WO2020034817A1 - Procédé, dispositif et système de commande de politique - Google Patents

Procédé, dispositif et système de commande de politique Download PDF

Info

Publication number
WO2020034817A1
WO2020034817A1 PCT/CN2019/097541 CN2019097541W WO2020034817A1 WO 2020034817 A1 WO2020034817 A1 WO 2020034817A1 CN 2019097541 W CN2019097541 W CN 2019097541W WO 2020034817 A1 WO2020034817 A1 WO 2020034817A1
Authority
WO
WIPO (PCT)
Prior art keywords
network element
terminal
policy control
mobility management
policy
Prior art date
Application number
PCT/CN2019/097541
Other languages
English (en)
Chinese (zh)
Inventor
宗在峰
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2020034817A1 publication Critical patent/WO2020034817A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0011Control or signalling for completing the hand-off for data sessions of end-to-end connection
    • H04W36/0033Control or signalling for completing the hand-off for data sessions of end-to-end connection with transfer of context information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/12Reselecting a serving backbone network switching or routing node

Definitions

  • the present application relates to the field of communications technologies, and in particular, to a method, device, and system for policy control.
  • access and mobility management (AMF) network elements It can interact with policy control function (policy control function (PCF) network elements in order to obtain the policies of the terminal and access and mobility management policies.
  • policy control function policy control function
  • the terminal of a roaming user registers with a visited public land mobile network (VPLMN) in the visiting process.
  • a visited-PCF (V-PCF) network element in the terminal's visiting place interacts with a PCF (home-PCF, H-PCF) network element in the terminal's visiting place, so that the AMF network element located in the visiting place of the terminal can obtain the terminal Strategies, and access and mobility management strategies.
  • the policy of the terminal may be formulated by the V-PCF network element for the terminal, and the V-PCF network element may save the policy of the terminal formulated by the V-PCF network element in the visited unified database (visited- unified data repository (V-UDR).
  • V-UDR visited- unified data repository
  • the embodiments of the present application provide a method, a device, and a system for controlling a policy, so that storage resources of a V-UDR network element can be saved.
  • a policy control method includes: a first mobile management network element of a first visited network determines that the terminal leaves the first visited network; the first mobile management network element reports to the first mobile management network element; The policy control network element of the first visited network sends instruction information, which is used to instruct the policy control network element to delete the policy of the terminal stored in the unified database network element of the first visited network. Based on the policy control method provided in the embodiment of the present application, after the first mobile management network element can determine that the terminal leaves the first visited network, it can promptly instruct the policy control network element to delete and save the data in the unified database network element of the first visited network. Therefore, it can save storage resources in the unified database network element of the first visited network.
  • the first mobility management network element determines that the terminal leaves the first visited network, specifically: the first mobility management network element receives a second mobility management network element from the second visited network A first context transmission request message, the first context transmission request message is used to request to obtain a context of the terminal. That is, in the embodiment of the present application, the terminal can be moved from the network of one visited place to the network of another visited place, which is not specifically limited in the embodiment of the present application.
  • the first mobility management network element determining that the terminal leaves the first visited network is specifically: the first mobility management network element receives a third mobility management network element from a home network of the terminal A second context transmission request message, the second context transmission request message is used to request to obtain a context of the terminal. That is, in the embodiment of the present application, the terminal can be moved from the visited network to the home network of the terminal, which is not specifically limited in this embodiment of the present application.
  • the first mobility management network element determines that the terminal leaves the first visited network, specifically: the first mobility management network element receives a deregistration request from the terminal, and the deregistration request uses For requesting to perform deregistration of the terminal. That is, in the embodiment of the present application, the terminal may initiate de-registration of the terminal, so that the terminal leaves the first visited network where the terminal is currently located, which is not specifically limited in this embodiment of the present application.
  • the first mobility management network element determines that the terminal leaves the first visited network, specifically: the first mobility management network element receives a deregistration notification from a data management network element, and the deregistration The notification is used to notify the first mobility management network element to perform deregistration of the terminal. That is to say, in the embodiment of the present application, the network side may initiate de-registration of the terminal, so that the terminal leaves the first visited network, and this embodiment of the present application does not specifically limit this.
  • the policy control method before the first mobility management network element determines that the terminal leaves the first visited network, the policy control method further includes: the first mobility management network element receives a registration request from the terminal; Sending, by the first mobility management network element, a third context transmission request message to a fourth mobility management network element in the first visited network, where the third context transmission request message is used to request the context of the terminal; the first mobile The management network element receives a context transmission response from the fourth mobile management network element, where the context transmission response includes the identity of the unified database network element; the first mobility management network element sends the unified database network element to the policy control network element Identification, the identification of the unified database network element is used to obtain the policy of the terminal from the unified database network element.
  • the first mobility management network element of the first visited network may obtain the first mobility management network element from the fourth mobility management network element of the first visited network.
  • the identity of the unified database network element of the visited network, and when the policy association is created, the identity of the unified database network element is sent to the policy control network element, so that the policy control network element can unify the identity corresponding to the identity of the unified database network element.
  • the database network element obtains the policy of the terminal. Therefore, based on this solution, when a terminal moves between different mobile management network elements in the same visited network, it is ensured that different policy control network elements can find the same unified database network element, and then can be retrieved from the unified database network element. Get the policy of this terminal.
  • the policy control method before the first mobility management network element determines that the terminal leaves the first visited network, the policy control method further includes: the first mobility management network element receives a registration request from the terminal; The first mobility management network element sends a policy association creation request message to the policy control network element; the first mobility management network element receives the identity of the unified database network element from the policy control network element. That is, in the embodiment of the present application, when the terminal registers with the first visited network, the first mobility management network element that the terminal initially accesses can obtain the policy control selected when the terminal initially accesses the first visited network. The identity of the unified database network element selected by the network element.
  • the policy control method further includes: the first mobility management network element receives a fourth context transmission request message from a fifth mobility management network element in the first visited network, and the fourth context The transmission request message is used to request to obtain the context of the terminal; the first mobility management network element sends a context transmission response to the fifth mobility management network element, the context transmission response includes an identifier of the unified database network element, and the unified database network element Is used to obtain the terminal's policy from the consolidated database network element.
  • the first mobility management network element that the terminal initially accesses can obtain the information selected by the terminal when the terminal first accesses the first visited network.
  • the identity of the unified database network element selected by the policy control network element enables the subsequent terminal to provide the identity of the unified database network element to the latest mobility management network element when a re-selection of the mobility management network element occurs in the first visited network.
  • the latest mobile management network element provides the policy control network element of the latest first visited network, and the policy control network element of the latest first visited network can obtain the unified database network corresponding to the identity of the unified database network element. Meta acquisition terminal strategy. Therefore, based on this solution, when a terminal moves between different mobile management network elements in the same visited network, it is ensured that different policy control network elements can find the same unified database network element, and then can be retrieved from the unified database network element. Get the policy of this terminal.
  • a policy control method includes: a policy control network element of a first visited network receives instruction information from a first mobility management network element of the first visited network, the instruction information It is used to instruct the policy control network element to delete the policy of the terminal stored in the unified database network element of the first visited network; the policy control network element sends a delete request message to the unified database network element according to the instruction information, and the deletion The request message is used to request to delete the policy of the terminal stored in the unified database network element.
  • the first mobile management network element can determine that the terminal leaves the first visited network, it can promptly instruct the policy control network element to delete and save the data in the unified database network element of the first visited network. Therefore, it can save storage resources in the unified database network element of the first visited network.
  • the policy control method before the policy control network element receives the instruction information of the first mobility management network element from the first visited network, the policy control method further includes: the policy control network element receives the The identity of the unified database network element of a mobile management network element; the policy controls the network element to obtain the policy of the terminal from the unified database network element corresponding to the identity of the unified database network element.
  • the policy control network element can obtain the policy of the terminal from the unified database network element corresponding to the identifier of the unified database network element.
  • the policy control method before the policy control network element receives the instruction information of the first mobility management network element from the first visited network, the policy control method further includes: the policy control network element receives the A policy association creation request message of a mobile management network element; the policy control network element selects the unified database network element to save the terminal's policy; the policy control network element sends the identity of the unified database network element to the first mobility management network element .
  • the first mobility management network element may obtain the identity of the unified database network element when creating a policy association.
  • a policy control method includes: a first mobility management network element of a first visited network receives a registration request from a terminal; the first mobility management network element requests the first visited location A second mobility management network element in the network sends a first context transmission request, where the first context transmission request message is used to request the context of the terminal; the first mobility management network element receives the context from the second mobility management network element A transmission response, where the context transmission response includes the identity of the unified database network element of the first visited network; the first mobility management network element sends the identity of the unified database network element to the policy control network element of the first visited network, The identity of the unified database network element is used to obtain the policy of the terminal from the unified database network element.
  • the first mobility management network element of the first visited network may obtain the first mobility management network element from the second mobility management network element of the first visited network.
  • the identity of the unified database network element of the visited network and the identity of the unified database network element can be sent to the policy control network element, so that the policy control network element can obtain it from the unified database network element corresponding to the identity of the unified database network element.
  • the strategy of the terminal therefore, based on this solution, when the terminal moves between different mobility management network elements in the same visited network, it is guaranteed that different policy control network elements can find the same unified database network element, and from this unified The strategy for obtaining the terminal in the database network element.
  • the policy control method further includes: the first mobility management network element determining that the terminal leaves the first visited network; the first mobility management network element sending instruction information to the policy control network element, The instruction information is used to instruct the policy control network element to delete the policy of the terminal stored in the unified database network element.
  • the first mobile management network element can determine that the terminal leaves the first visited network, it can promptly instruct the policy control network element to delete and save the data in the unified database network element of the first visited network. Therefore, it can save storage resources in the unified database network element of the first visited network.
  • the first mobility management network element determines that the terminal leaves the first visited network, specifically: the first mobility management network element receives a second mobility management network element from the second visited network A first context transmission request message, the first context transmission request message is used to request to obtain a context of the terminal. That is, in the embodiment of the present application, the terminal can be moved from the network of one visited place to the network of another visited place, which is not specifically limited in the embodiment of the present application.
  • the first mobility management network element determining that the terminal leaves the first visited network is specifically: the first mobility management network element receives a third mobility management network element from a home network of the terminal A second context transmission request message, the second context transmission request message is used to request to obtain a context of the terminal. That is, in the embodiment of the present application, the terminal can be moved from the visited network to the home network of the terminal, which is not specifically limited in this embodiment of the present application.
  • the first mobility management network element determines that the terminal leaves the first visited network, specifically: the first mobility management network element receives a deregistration request from the terminal, and the deregistration request uses For requesting to perform deregistration of the terminal. That is, in the embodiment of the present application, the terminal may initiate de-registration of the terminal, so that the terminal leaves the first visited network where the terminal is currently located, which is not specifically limited in this embodiment of the present application.
  • the first mobility management network element determines that the terminal leaves the first visited network, specifically: the first mobility management network element receives a deregistration notification from a data management network element, and the deregistration The notification is used to notify the first mobility management network element to perform deregistration of the terminal. That is to say, in the embodiment of the present application, the network side may initiate de-registration of the terminal, so that the terminal leaves the first visited network, and this embodiment of the present application does not specifically limit this.
  • a policy control method includes: a policy control network element of a first visited network receives the first visited location from a first mobile management network element of the first visited network; The identity of the unified database network element of the network; the policy controls the network element to obtain the policy of the terminal from the unified database network element corresponding to the identity of the unified database network element.
  • the policy controlled network element since the first mobility management network element of the first visited network can send the identity of the unified database network element of the first visited network to the policy controlled network element, the policy controlled network element The policy of the terminal can be obtained from the unified database network element corresponding to the identity of the unified database network element.
  • the policy control method includes: the policy control network element receives instruction information from the first mobility management network element, the instruction information is used to instruct the policy control network element to delete the unified database network element The policy of the saved terminal; the policy controls the network element to send a delete request message to the unified database network element according to the instruction information, and the delete request message is used to request deletion of the policy of the terminal stored in the unified database network element.
  • the first mobile management network element can determine that the terminal leaves the first visited network, it can promptly instruct the policy control network element to delete and save the data in the unified database network element of the first visited network. Therefore, it can save storage resources in the unified database network element of the first visited network.
  • a first mobility management network element has a function of implementing the method described in the first aspect or the third aspect.
  • This function can be realized by hardware, and can also be implemented by hardware executing corresponding software.
  • the hardware or software includes one or more modules corresponding to the above functions.
  • a first mobility management network element including: a processor and a memory; the memory is configured to store a computer execution instruction, and when the first mobility management network element is running, the processor executes the memory stored in the memory.
  • the computer executes instructions to cause the first mobility management network element to execute the policy control method according to any one of the first aspect or the third aspect.
  • a first mobility management network element including: a processor; the processor is configured to be coupled to the memory, and after reading an instruction in the memory, execute the first aspect or the first aspect according to the instruction.
  • the strategy control method according to any one of the three aspects.
  • a computer-readable storage medium stores instructions that, when run on a computer, enable the computer to execute any one of the first or third aspects described above.
  • a computer program product containing instructions which, when run on a computer, enables the computer to execute the policy control method according to any one of the first aspect or the third aspect.
  • an apparatus for example, the apparatus may be a chip system
  • the apparatus includes a processor, and is configured to support a first mobility management network element to implement the functions involved in the first aspect or the third aspect, For example, it is determined that the terminal leaves the first visited network.
  • the device further includes a memory, which is configured to store program instructions and data necessary for the first mobility management network element.
  • the device is a chip system, it may be composed of a chip, or it may include a chip and other discrete devices.
  • a policy control network element has a function of implementing the method described in the second aspect or the fourth aspect.
  • This function can be realized by hardware, and can also be implemented by hardware executing corresponding software.
  • the hardware or software includes one or more modules corresponding to the above functions.
  • a policy control network element including: a processor and a memory; the memory is configured to store computer execution instructions; when the policy control network element is running, the processor executes the computer execution stored in the memory; An instruction to make the policy control network element execute the policy control method according to any one of the second aspect or the fourth aspect.
  • a policy control network element including: a processor; the processor is configured to be coupled to a memory, and after reading an instruction in the memory, execute the second or fourth aspect according to the instruction.
  • the method of policy control according to any one of the aspects.
  • a computer-readable storage medium stores instructions, and when the computer-readable storage medium is run on a computer, the computer can execute any one of the second aspect or the fourth aspect.
  • the strategy control method is provided.
  • a computer program product containing instructions which when executed on a computer, enables the computer to execute the policy control method according to any one of the second aspect or the fourth aspect.
  • an apparatus for example, the apparatus may be a chip system
  • the apparatus includes a processor, and is configured to support a policy control network element to implement the functions involved in the second or fourth aspect, for example,
  • the policy of the terminal is obtained from the unified database network element corresponding to the identity of the unified database network element.
  • the device further includes a memory, which is configured to store program instructions and data necessary for the policy control network element.
  • the device is a chip system, it may be composed of a chip, or it may include a chip and other discrete devices.
  • a policy control system includes: a first mobility management network element of a first visited network and a policy control network element of the first visited network; the first mobility management network Element, which is used to determine that the terminal leaves the first visited network; the first mobility management network element is further used to send instruction information to a policy control network element of the first visited network, and the instruction information is used to indicate the policy
  • the control network element deletes the policy of the terminal stored in the unified database network element of the first visited network; the policy control network element is configured to receive the instruction information from the first mobility management network element, and according to the instruction information , Sending a delete request message to the unified database network element, where the delete request message is used to request to delete the policy of the terminal stored in the unified database network element.
  • the policy control system further includes the unified database network element; the unified database network element is configured to delete the policy of the terminal stored in the unified database network element according to the delete request message.
  • the unified database network element is configured to delete the terminal stored in the unified database network element according to the delete request message, and is specifically configured to: according to the delete request message, at a preset time If a policy request or a policy update request of the terminal is not received, the policy of the terminal stored in the unified database network element is deleted.
  • the first mobility management network element is further configured to receive a registration request from the terminal; the first mobility management network element is further configured to provide a fourth mobility to the first visited network The management network element sends a third context transmission request, where the third context transmission request message is used to request the context of the terminal; the first mobility management network element is further configured to receive a context transmission response from the fourth mobility management network element.
  • the context transmission response includes the identity of the unified database network element; the first mobility management network element is further configured to send the identity of the unified database network element to the policy control network element; the policy control network element is further configured to receive The identity of the unified database network element from the first mobility management network element, and the policy of the terminal is obtained from the unified database network element corresponding to the identity of the unified database network element.
  • the first mobility management network element is further configured to receive a registration request from the terminal; the first mobility management network element is further configured to send a policy association creation request message to the policy control network element.
  • the policy control network element is further configured to receive the policy association creation request message from the first mobility management network element and select the unified database network element to save the policy of the terminal; the policy control network element is also used to The first mobility management network element sends the identity of the unified database network element; the first mobility management network element is further configured to receive the identity of the unified database network element from the policy control network element.
  • a policy control system includes a first mobility management network element of a first visited network, a second mobility management network element of a first visited network, and a first visited network.
  • a network policy control network element a first mobility management network element for receiving a registration request from a terminal, and sending a first context transmission request to a second mobility management network element, the first context transmission request message being used to request to obtain the The context of the terminal; a second mobility management network element for receiving a first context transmission request from the first mobility management network element, and sending a context transmission response to the first mobility management network element, the context transmission response including the first visit
  • the identity of the unified database network element of the local network; the first mobility management network element is further configured to receive a context transmission response from the second mobility management network element, and send the identity of the unified database network element to the policy control network element;
  • the policy control network element is configured to receive the identity of the unified database network element from the first mobility management network element, and Policy for the terminal library network element identifie
  • the first mobility management network element is further configured to determine that the terminal leaves the first visited network; the first mobility management network element is further configured to send instruction information to the policy control network element.
  • the instruction information is used to instruct the policy control network element to delete the policy of the terminal stored in the unified database network element; the policy control network element is further configured to receive the instruction information from the first mobility management network element, and according to The instruction information sends a delete request message to the unified database network element, and the delete request message is used to request to delete the policy of the terminal stored in the unified database network element.
  • the policy control system further includes the unified database network element described above; the unified database network element is configured to delete the policy of the terminal stored in the unified database network element according to the delete request message.
  • the unified database network element deletes the terminal's policy stored in the unified database network element according to the deletion request message, specifically: the unified database network element presets the deletion request message in the preset If no policy request or policy update request of the terminal is received within the time, the policy of the terminal stored in the unified database network element is deleted.
  • FIG. 1 is a schematic diagram of a 5G network architecture in an existing hometown routing roaming scenario
  • FIG. 2 is a schematic diagram of a 5G network architecture in an existing local grooming roaming scenario
  • FIG. 3 is a first schematic architecture diagram of a policy control system according to an embodiment of the present application.
  • FIG. 4 is a second schematic architecture diagram of a policy control system according to an embodiment of the present application.
  • FIG. 5 is a schematic diagram of a hardware structure of a communication device according to an embodiment of the present application.
  • FIG. 6 is a schematic flowchart of a policy control method according to an embodiment of the present application.
  • FIG. 7 is a second schematic flowchart of a policy control method according to an embodiment of the present application.
  • FIG. 8 is a third flowchart of a policy control method according to an embodiment of the present application.
  • FIG. 9 is a fourth flowchart of a policy control method according to an embodiment of the present application.
  • FIG. 10 is a schematic flowchart of a policy control method according to an embodiment of the present application.
  • FIG. 11 is a schematic flowchart of a policy control method according to an embodiment of the present application.
  • FIG. 12 is a first schematic structural diagram of a first mobility management network element according to an embodiment of the present application.
  • FIG. 13 is a first schematic structural diagram of a policy control network element according to an embodiment of the present application.
  • FIG. 14 is a second schematic structural diagram of a first mobility management network element according to an embodiment of the present application.
  • FIG. 15 is a second schematic structural diagram of a policy control network element according to an embodiment of the present application.
  • the network architecture includes the VPLMN of the terminal and the home land mobile network (HPLMN) of the terminal.
  • the terminal is currently located in the VPLMN of the terminal, and the VPLMN of the terminal includes an access device, a user plane function (UPF) 1 network element, an AMF network element, and a visited-session session management function network element (visited-session) management function (SMF) network element, V-PCF network element, or V-UDR network element, etc .
  • the HPLMN of this terminal includes a UPF2 network element, an SMF (home-SMF, H-SMF) network element, H- A PCF network element, a home-UDR (H-UDR) network element at home, a unified data management (UDM) network element, or an application function (AF) network element.
  • UPF2 network element an SMF (home-SMF, H-SMF) network element, H- A PCF network element, a home-UDR (H-UDR) network element at home,
  • the terminal accesses the 5G network through the access device, and the terminal communicates with the AMF network element through the next generation network (n) interface 1 (referred to as N1); the access device communicates with the AMF network element through the N2 interface (referred to as N2).
  • N1 next generation network interface 1
  • N2 next generation network
  • AMF network element communicates with V-SMF network element through N11 interface (N11), communicate with V-PCF network element through N15 interface (N15), and N8 interface (Referred to as N8) communicates with UDM network elements;
  • V-SMF network elements communicate with H-SMF network elements through N16 interface (referred to as N16), communication with V-PCF network elements through N7 interface (referred to as N7), and N4 interface (referred to as N4) communicates with the UPF1 network element;
  • the UPF1 network element communicates with the UPF2 network element through the N9 interface (referred to as N9);
  • the H-SMF network element communicates with the H-PCF network element through the N7 interface (referred to as N7) and the N10 interface (referred to as N10)
  • V-PCF network elements communicate with H-PCF network elements through N24 interface (referred to as N24);
  • V-UDR network elements communicate with V-PCF network
  • control plane network elements such as AMF network element, V-SMF network element, H-SMF network element, V-PCF network element, H-PCF network element or UDM network element in the 5G network shown in FIG. 1 You can also use service-oriented interfaces to interact.
  • the external service-oriented interface provided by the AMF network element may be Namf; the external service-oriented interface provided by the V-SMF network element may be Nvsmf; the external service-oriented interface provided by the H-SMF network element may be Nhsmf; the H-PCF network element
  • the external serviced interface provided by the V-PCF network element can be Nhpcf; the external serviced interface provided by the V-PCF network element can be Nvpcf; the external serviced interface provided by the UDM network element can be Nudm, etc.
  • the 5G system architecture diagram in the 23501 standard which will not be repeated here.
  • FIG. 2 it is a schematic diagram of a 5G network architecture in an existing local grooming roaming scenario.
  • the network architecture includes the VPLMN of the terminal and the HPLMN of the terminal.
  • the terminal is currently located in the VPLMN of the terminal, and the VPLMN of the terminal includes an access device, a UPF network element, an AMF network element, an SMF network element, a V-PCF network element, a V-UDR network element, or an AF network element, etc .
  • the HPLMN of the terminal includes an H-PCF network element, a UDM network element, or an H-UDR network element.
  • the terminal accesses the 5G network through the access device, and the terminal communicates with the AMF network element through N1;
  • the access device communicates with the AMF network element through N2, and communicates with the UPF network element through N3;
  • the AMF network element communicates with the SMF network element through N11 , Communicate with V-PCF network elements through N15, and UDM network elements through N8;
  • SMF network elements communicate with V-PCF network elements through N7, communicate with UPF network elements through N4, and communicate with UDM network elements through N10;
  • UPF network The V-PCF network element communicates with the H-PCF network element through N24, and communicates with the AF network element through N5;
  • the V-UDR network element communicates with the V-PCF network element;
  • H -UDR network element communicates with H-PCF network element.
  • AMF network element V-SMF network element, H-SMF network element, SMF network element, V-PCF network element, H-PCF network element or UDM in the 5G network shown in FIG. 1 or FIG. 2
  • Network elements such as network elements on the control plane can also use service-oriented interfaces for interaction.
  • the external service interface provided by AMF network elements can be Namf; the external service interface provided by SMF network elements can be Nsmf; the external service interface provided by V-SMF network elements can be Nvsmf; H-SMF network elements provide external services
  • the service-oriented interface provided by the H-PCF network element may be Nhpcf; the service-oriented interface provided by the V-PCF network element may be NVPCF; the service-oriented interface provided by the UDM network element may be Nudm ,Wait.
  • the 5G system architecture diagram in the 23501 standard which will not be repeated here.
  • the 5G network architecture shown in FIG. 1 or FIG. 2 only provides a VPLMN by way of example.
  • the terminal may also move from one VPLMN to another VPLMN.
  • the network elements in the VPLMN in different scenarios
  • For the connection methods please refer to the network elements and connection methods in the VPLMN in the 5G network architecture shown in FIG. 1 or FIG. 2, which will not be described one by one here.
  • a VPLMN includes an AMF network element, a V-SMF network element, a V-PCF network element, or a V-UDR network element.
  • a VPLMN can include multiple AMF network elements, multiple V-SMF network elements, multiple V-PCF network elements, or multiple V-UDR network elements.
  • Different AMF network elements can pass through the N14 interface (referred to as N14 for short). ) Communication; different V-PCF network elements can communicate through N24, and so on.
  • N14 referred to as N14 for short.
  • an HPLMN includes an H-PCF network element or an H-UDR network element.
  • HPLMN can include multiple H-PCF network elements or H-UDR network elements, and different H-PCF network elements can communicate through N24, etc.
  • H-PCF network elements can communicate through N24, etc.
  • the terminals involved in the embodiments of the present application may include various handheld devices with wireless communication functions, vehicle-mounted devices, wearable devices, computing devices, or other processing devices connected to a wireless modem; Including subscriber unit, cellular phone, smart phone, wireless data card, personal digital assistant (PDA) computer, tablet computer, wireless modem (modem), handheld device (handheld), laptop (computer), cordless phone (wireless local phone) or wireless local loop (WLL) station, machine type communication (MTC) terminal, user equipment (user equipment) , UE), mobile station (MS), terminal device (terminal device) or relay user equipment.
  • the relay user equipment may be, for example, a 5G residential gateway (RG).
  • RG 5G residential gateway
  • the access device referred to in the embodiments of the present application refers to a device that accesses a core network.
  • the access device may be a base station, a broadband network service gateway (BNG), an aggregation switch, or non-third-generation cooperation.
  • BNG broadband network service gateway
  • 3GPP 3rd generation partnership project
  • the base station may include various forms of base stations, such as: macro base stations, micro base stations (also called small stations), relay stations, access points, and the like.
  • At least one or more of the following or similar expressions refers to any combination of these items, including any combination of single or plural items.
  • at least one (a), a, b, or c can be expressed as: a, b, c, ab, ac, bc, or abc, where a, b, and c can be single or multiple .
  • words such as “first” and “second” are used to distinguish between the same or similar items having substantially the same functions and functions. Those skilled in the art can understand that the words “first”, “second” and the like do not limit the number and execution order, and the words “first” and “second” are not necessarily different.
  • the network architecture and service scenarios described in the embodiments of the present application are intended to more clearly illustrate the technical solutions of the embodiments of the present application, and do not constitute a limitation on the technical solutions provided in the embodiments of the present application. With the evolution of the network architecture and the emergence of new service scenarios, the technical solutions provided in the embodiments of the present application are also applicable to similar technical problems.
  • the policy control system 30 includes a first mobility management network element 301 of a first visited network and a policy control network element of a first visited network. 302.
  • the first mobility management network element 301 is used to determine that after the terminal leaves the first visited network, the terminal sends instruction information to the policy control network element 302, where the instruction information is used to instruct the policy control network element 302 to delete the first visited network. Unified terminal policies stored in database NEs.
  • the policy control network element 302 is configured to receive instruction information from the first mobility management network element 301, and send a deletion request message to the unified database network element according to the instruction information, where the deletion request message is used to request deletion of the storage in the unified database network element Terminal strategy.
  • the first mobility management network element 301 and the policy control network element 302 may communicate directly, or may communicate through forwarding by other devices, which is not specifically limited in this embodiment of the present application.
  • the terminal of the roaming user leaves the visited network where the current mobile management network element is located, because the original mobile management network element and the newly selected mobile management network element are not in the same network, the terminal has left the original The visited network, and whether it will still access the visited network in the future is unknown, so the policies of these roaming user terminals saved in the original unified database network element may not be used in the future, or only after a long time It will be used, and even if used, it may be out of date, which will waste the storage resources of the unified database network element.
  • the first mobile management network element can determine that the terminal leaves the first visited network, it can promptly instruct the policy control network element to delete the first database of the first visited network and save it in the unified database network element. Therefore, it can save storage resources in the unified database network element of the first visited network.
  • the policy control system 30 provided in the embodiment of the present application may further include a unified database network element 303.
  • the unified database network element 303 is configured to delete the terminal's strategy stored in the unified database network element according to the delete request message, which is not specifically limited in this embodiment of the present application.
  • a policy control system 40 includes a first mobile management network element 401 of a first visited network, and a first visited place.
  • the first mobility management network element 401 is configured to receive a registration request from a terminal and send a first context transmission request to the second mobility management network element 402.
  • the first context transmission request message is used to request the context of the terminal ( context).
  • the first mobility management network element 401 is further configured to receive a context transmission response from the second mobility management network element 402, where the context transmission response includes an identifier of a unified database network element of the first visited network.
  • the first mobility management network element 401 is further configured to send the identity of the unified database network element to the policy control network element 403.
  • the policy control network element 403 is configured to receive the identity of the unified database network element from the first mobility management network element 401, and obtain the policy of the terminal from the unified database network element corresponding to the identity of the unified database network element.
  • the first mobility management network element 401 and the policy control network element 403 may communicate directly, or may communicate through forwarding by other devices, which is not specifically limited in this embodiment of the present application.
  • the first mobility management network element 401 and the second mobility management network element 402 may communicate directly or may be communicated through forwarding by other devices, which is not specifically limited in this embodiment of the present application. .
  • the first mobility management network element of the first visited network can obtain the first mobility management network element from the second mobility management network element of the first visited network.
  • the identity of the unified database network element of the visited network and sends the identity of the unified database network element to the policy control network element, so that the policy control network element can obtain the terminal from the unified database network element corresponding to the identity of the unified database network element Therefore, based on this solution, when the terminal moves between different mobile management network elements in the same visited network, it is ensured that different policy control network elements can find the same unified database network element, and then from this unified database The strategy of obtaining the terminal in the network element.
  • the policy control system shown in FIG. 3 or FIG. 4 may be applied to the 5G network architecture in the home routing roaming scenario shown in FIG. 1 or the 5G network architecture in the local grooming roaming scenario shown in FIG. 2, It can also be applied to other roaming network architectures in the future, which is not specifically limited in this embodiment of the present application.
  • the network element or entity corresponding to the first mobility management network element 301 in FIG. 3, the first mobility management network element 401 or the second mobility management network element 402 in FIG. 4 may be the VPLMN in the above 5G network architecture.
  • AMF network element; the network element or entity corresponding to the policy control network element 302 in FIG. 3 or the policy control network element 403 in FIG. 4 may be the V-PCF network element in the VPLMN in the above 5G network architecture.
  • the first mobility management network element 301 or the policy control network element 302 in FIG. 3 or the first mobility management network element 401 or the policy control network element 403 in FIG. 4 may be implemented by one device. It can also be implemented by multiple devices together, or it can be a functional module in one device, which is not specifically limited in this embodiment of the present application. It can be understood that the foregoing functions may be network elements in hardware devices, software functions running on dedicated hardware, or virtualized functions instantiated on a platform (for example, a cloud platform).
  • FIG. 5 is a schematic diagram of a hardware structure of a communication device according to an embodiment of the present application.
  • the communication device 500 includes a processor 501, a communication line 502, a memory 503, and at least one communication interface (in FIG. 5, only the communication interface 504 is taken as an example for description).
  • the processor 501 may be a general-purpose central processing unit (CPU), a microprocessor, an application-specific integrated circuit (ASIC), or one or more processors for controlling the execution of the program of the solution of the present application. integrated circuit.
  • CPU central processing unit
  • ASIC application-specific integrated circuit
  • the communication line 502 may include a path for transmitting information between the aforementioned components.
  • the communication interface 504 uses any device such as a transceiver to communicate with other devices or communication networks, such as Ethernet, radio access network (RAN), wireless local area networks (WLAN), etc. .
  • RAN radio access network
  • WLAN wireless local area networks
  • the memory 503 may be a read-only memory (ROM) or other type of static storage device that can store static information and instructions, a random access memory (random access memory, RAM), or other types that can store information and instructions
  • the dynamic storage device can also be electrically erasable programmable read-only memory (EEPROM-ready-only memory (EEPROM)), compact disc (read-only memory (CD-ROM)) or other optical disk storage, optical disk storage (Including compact discs, laser discs, optical discs, digital versatile discs, Blu-ray discs, etc.), magnetic disk storage media or other magnetic storage devices, or can be used to carry or store desired program code in the form of instructions or data structures and can be used by a computer Any other media accessed, but not limited to this.
  • the memory may exist independently, and is connected to the processor through the communication line 502. The memory can also be integrated with the processor.
  • the memory 503 is configured to store a computer execution instruction for executing the solution of the present application, and the execution is controlled by the processor 501.
  • the processor 501 is configured to execute computer execution instructions stored in the memory 503, so as to implement the policy control method provided in the following embodiments of the present application.
  • the computer-executable instructions in the embodiments of the present application may also be referred to as application program codes, which are not specifically limited in the embodiments of the present application.
  • the processor 501 may include one or more CPUs, such as CPU0 and CPU1 in FIG. 5.
  • the communication device 500 may include multiple processors, such as the processor 501 and the processor 508 in FIG. 5. Each of these processors may be a single-CPU processor or a multi-CPU processor.
  • a processor herein may refer to one or more devices, circuits, and / or processing cores for processing data (such as computer program instructions).
  • the communication device 500 may further include an output device 505 and an input device 506.
  • the output device 505 is in communication with the processor 501 and can display information in a variety of ways.
  • the output device 505 may be a liquid crystal display (LCD), a light emitting diode (LED) display device, a cathode ray tube (CRT) display device, or a projector. Wait.
  • the input device 506 is in communication with the processor 501 and can receive user input in a variety of ways.
  • the input device 506 may be a mouse, a keyboard, a touch screen device, or a sensing device.
  • the above-mentioned communication device 500 may be a general-purpose device or a special-purpose device.
  • the communication device 500 may be a desktop computer, a portable computer, a network server, a personal digital assistant (PDA), a mobile phone, a tablet computer, a wireless terminal device, an embedded device, or a device with a similar structure in FIG. 5. device.
  • PDA personal digital assistant
  • the embodiment of the present application does not limit the type of the communication device 500.
  • the policy control system shown in FIG. 3 is applied to the 5G network architecture in the hometown routing roaming scenario shown in FIG. 1 or the local grooming roaming scenario shown in FIG. 2 as an example.
  • the HPLMN of the terminal includes a UDM The network element, the H-PCF1 network element, the H-PCF2 network element, and the H-UDR network element.
  • the terminal leaves the VPLMN1 where the AMF1 network element, the V-PCF1 network element, and the V-UDR1 network element are located, and enters the AMF2 network element,
  • the VPLMN2 in which the V-PCF2 network element and the V-UDR2 network element are located, as shown in FIG. 6, is a policy control method provided by this embodiment of the present application, including the following steps:
  • the terminal moves, and sends a registration request message to the AMF2 network element through the access device in the VPLMN2, so that the AMF2 network element receives the registration request message from the terminal.
  • the AMF2 network element sends a context transfer request (context transfer request) message to the AMF1 network element, so that the AMF1 network element receives the context transmission request message from the AMF2 network element, and the context transmission request message is used to request the context of the terminal.
  • context transfer request context transfer request
  • the AMF1 network element after the AMF1 network element receives the context transmission request message from the AMF2 network element, it can know that the terminal leaves the VPLMN1 where the AMF1 network element is located, which is described here in a unified manner, and will not be described again below.
  • the AMF1 network element sends a context transfer response (context transfer response) message to the AMF2 network element, so that the AMF2 network element receives the context transmission response message from the AMF1 network element.
  • the context transmission response message includes the context of the terminal.
  • the context of the terminal sent by the AMF1 network element to the AMF2 network element does not include the identity of the V-PCF1 network element in VPLMN1.
  • the AMF2 network element registers with the UDM network element and obtains the contract data of the terminal.
  • the AMF2 network element sends a registration complete notification to the AMF1 network element, so that the AMF1 network element receives the registration completion notification from the AMF2 network element.
  • the deregistration completion notification is used to notify the completion of registration of the AMF1 network element with the AMF2 network element.
  • the AMF2 network element after the AMF2 network element is registered with the UDM network element, it may also subscribe to the contract data modification notification.
  • the AMF2 network element may also subscribe to the contract data modification notification.
  • the UDM network element sends a deregistration notification request to the AMF1 network element, so that the AMF1 network element receives the deregistration notification request from the UDM network element.
  • the deregistration notification request is used by the AMF1 network element to delete the context of the terminal.
  • the AMF1 network element sends a deregistration notification response to the UDM network element, so that the UDM network element receives the deregistration notification response from the AMF1 network element.
  • the AMF1 network element may cancel the subscription to the contract data modification notification.
  • the AMF2 network element does not receive the identity of the V-PCF1 network element, the AMF2 network element reselects the V-PCF network element and the H-PCF network element, assuming that the V-PCF2 network element and the H-PCF2 network element are respectively, The AMF2 network element sends a policy association creation request 1 to the V-PCF2 network element, so that the V-PCF2 network element receives a policy association creation request message 1 from the AMF2 network element, and the policy association creation request message 1 is used to request the creation of a policy association. .
  • the policy association here refers to an association between the AMF2 network element and the V-PCF2 network element. This association is used for the AMF2 network element to pass the current access-related parameters of the terminal to the V-PCF2 network element, and V -The PCF2 network element provides the policy of the terminal to the AMF2 network element, and the related description can refer to the definition of the existing policy association, which is not repeated here.
  • the policy association creation request message 1 in the embodiment of the present application may be, for example, a policy control creation request (policy control create request) message 1, which is not specifically limited in this embodiment of the present application.
  • the policy association creation request message 1 may further include indication information 1, which is used to instruct the terminal to move from other public land mobile network (PLMN) to V -VPLMN2 where the PCF2 network element is located, which is not specifically limited in this embodiment of the present application.
  • PLMN public land mobile network
  • the V-PCF2 network element sends a policy association creation response message 1 to the AMF2 network element, so that the AMF2 network element receives the policy association creation response message 1 from the V-PCF2 network element.
  • the policy association creation response message 1 in the embodiment of the present application may be, for example, a policy control creation response message 1.
  • the embodiment of the present application does not specifically limit this.
  • the V-PCF2 network element sends a query request 1 to the V-UDR2 network element, so that the V-UDR2 network element receives the query request 1 from the V-PCF2 network element.
  • the query request 1 is used to request a policy for acquiring a terminal stored in a V-UDR2 network element.
  • the V-UDR2 network element sends a query response 1 to the V-PCF2 network element, so that the V-PCF2 network element receives the query response 1 from the V-UDR2 network element.
  • the query response 1 includes the policy of the terminal stored in the V-UDR2 network element; otherwise, the query response 1 does not include the policy of the terminal.
  • step S608 includes the indication information 1
  • steps S609-S610 which are collectively described here and will not be described in detail below.
  • the V-PCF2 network element sends a policy association creation request message 2 to the H-PCF2 network element, so that the H-PCF2 network element receives the policy association creation request message 2 from the V-PCF2 network element, and the policy association creation request message 2 Used to request the creation of a policy association.
  • the policy association here refers to an association between the V-PCF2 network element and the H-PCF2 network element. This association is used for the H-PCF2 network element to provide the terminal's policy to the V-PCF2 network element, and the related description. Please refer to the definition of the existing policy association, which will not be repeated here.
  • the policy association creation request message 2 in the embodiment of the present application may be, for example, a policy control creation request message 2, which is not specifically limited in this embodiment of the present application.
  • the H-PCF2 network element sends a query request 2 to the H-UDR network element, so that the H-UDR network element receives the query request 2 from the H-PCF2 network element.
  • the query request 2 is used to request a policy of a terminal stored in an H-UDR network element.
  • the H-UDR network element sends a query response 2 to the H-PCF2 network element, so that the H-PCF2 network element receives the query response 2 from the H-UDR network element.
  • the query response 2 includes the policy of the terminal stored in the H-UDR network element; otherwise, the query response 2 does not include the policy of the terminal.
  • the H-PCF2 network element sends a policy association creation response message 2 to the V-PCF2 network element, so that the V-PCF2 network element receives the policy association creation response message 2 from the H-PCF2 network element.
  • the policy association creation response message 2 includes the policy of the terminal after the update of the H-PCF2 network element. This is not specifically limited.
  • the updated terminal policy may also be referred to as the terminal policy formulated for the terminal, which is described here in a unified manner, and is not described in detail below.
  • the policy association creation response message 2 in the embodiment of the present application may, for example, create a response message 2 for policy control, which is not specifically limited in this embodiment of the present application.
  • the V-PCF2 network element formulates the terminal policy for the terminal, or the H-PCF2 network element updates the policy of the terminal, the V-PCF2 network element sends an N1N2 message transmission request (N1N2 message transfer transfer request to the AMF2 network element). ), So that the AMF2 network element receives the N1N2 message transmission request from the V-PCF2 network element.
  • the N1N2 message transmission request includes the policy of the terminal formulated by the V-PCF2 network element for the terminal.
  • the N1N2 message transmission request includes the updated terminal policy of the H-PCF2 network element, which is not specifically limited in this embodiment of the application. .
  • the V-PCF2 network element if the V-PCF2 network element does not receive the policy of the terminal in the query response 1, or although the V-PCF2 network element 2 receives the policy of the terminal, the V-PCF2 network element The policy of the terminal needs to be updated. At this time, the V-PCF2 network element formulates the policy of the terminal for the terminal, which is described here in a unified manner, and will not be described in detail below.
  • the policy association creation response message 1 in the embodiment of the present application may, for example, create a response message 1 for policy control, which is not specifically limited in this embodiment of the present application.
  • the AMF1 network element sends a policy association deletion request 1 to the V-PCF1 network element, so that the V-PCF1 network element receives the policy association deletion request 1 from the AMF1 network element.
  • the policy association deletion request 1 is used to request the V-PCF1 network element to delete the policy association created by the AMF1 network element and the V-PCF1 network element.
  • the policy association deletion request 1 includes indication information 2, which is used to instruct the V-PCF1 network element to delete the policy of the terminal stored in the V-UDR1 network element.
  • the policy association deletion request 1 in the embodiment of the present application may be, for example, a policy control deletion request (policy control delete request) message 1, which is not specifically limited in this embodiment of the present application.
  • policy control delete request policy control delete request
  • the V-PCF1 network element sends a delete request to the V-UDR1 network element, so that the V-UDR1 network element receives the delete request from the V-PCF1 network element.
  • the deletion request is used to request to delete the policy of the terminal stored in the V-UDR1 network element.
  • the V-UDR1 network element may directly delete the policy of the terminal stored in the V-UDR1 network element.
  • the V-UDR1 network element may not receive the policy request or policy of the terminal sent by other V-PCF network elements within a preset time.
  • the policy of the terminal stored in the V-UDR1 network element is deleted.
  • a V-UDR1 network element may start a timer after receiving a delete request from a V-PCF1 network element. If the V-UDR1 network element does not receive the V-PCF network element's If the terminal requests a policy or a policy update, the V-UDR1 network element may delete the policy of the terminal stored in the V-UDR1 network element.
  • the embodiment of the present application does not limit the manner for determining the timer time.
  • the V-UDR1 network element sends a deletion response to the V-PCF1 network element, so that the V-PCF1 network element receives the deletion response from the V-UDR1 network element.
  • the deletion response is used to indicate that the V-UDR1 network element has deleted the saved policy of the terminal.
  • the V-PCF1 network element sends a policy association deletion response 1 to the AMF1 network element, so that the AMF1 network element receives the policy association deletion response 1 from the V-PCF1 network element.
  • the policy association deletion response 1 is used to indicate that the policy association created by the AMF1 network element and the V-PCF1 network element before the V-PCF1 network element has been deleted.
  • the policy association deletion response 1 in the embodiment of the present application may be, for example, a policy control deletion response message 1. This embodiment of the present application does not specifically limit this.
  • the V-PCF1 network element sends a policy association deletion request 2 to the H-PCF1 network element.
  • the policy association deletion request 2 is used to request the H-PCF1 network element to delete the policy association created by the H-PCF1 network element and the H-PCF1 network element.
  • the policy association deletion request 2 in the embodiment of the present application may be, for example, a policy control deletion request message 2, which is not specifically limited in this embodiment of the present application.
  • the H-PCF1 network element sends an update request 1 to the H-UDR network element, so that the H-UDR network element receives the update request 1 from the H-PCF1 network element.
  • the update request 1 is used for an H-UDR network element that stores a policy of a terminal maintained by the H-PCF1 network element.
  • the H-UDR network element sends an update response 1 to the H-PCF1 network element, so that the H-PCF1 network element receives the update response 1 from the H-UDR network element.
  • the H-PCF1 network element sends a policy association deletion response 2 to the V-PCF1 network element.
  • the policy association deletion response 2 is used to indicate that the H-PCF1 network element and the H-PCF1 network element create a policy association before the H-PCF1 network element has been deleted.
  • the policy association deletion response 2 in the embodiment of the present application may be, for example, a policy control deletion request response 2, which is not specifically limited in this embodiment of the present application.
  • the AMF2 network element sends a registration acceptance message to the terminal through the access device, so that the terminal receives the registration acceptance message from the AMF2 network element.
  • the AMF1 network element can learn that the terminal leaves VPLMN1, and thus can prompt the V-PCF1 network element to delete the -UDR1 network element
  • the saved terminal strategy can therefore save storage resources in the V-UDR1 network element.
  • the actions of the AMF1 network element or the V-PCF1 network element in the above steps S601 to S625 can be executed by the processor 501 in the communication device 500 shown in FIG. 5 calling the application program code stored in the memory 503, which is implemented in this application.
  • the example does not place any restrictions on this.
  • the policy control system shown in FIG. 3 is applied to the 5G network architecture in the home routing roaming scenario shown in FIG. 1 or the local grooming roaming scenario shown in FIG. 2 as an example. It is assumed that the terminal is connected to the AMF1 network. Element, V-PCF1 element, and V-UDR1 element, etc., leave VPLMN1, enter AMF3 element, H-PCF1 element, UDM element, and H-UDR element, as shown in Figure 7. As shown, a policy control method provided by an embodiment of the present application includes the following steps:
  • the terminal moves, and sends a registration request message to the AMF3 network element through the access device in the HPLMN, so that the AMF3 network element receives the registration request message from the terminal.
  • S702-S707 is similar to steps S602-S607 in FIG. 6, except that the AMF2 network element in VPLMN2 in steps S602-S607 is replaced with the AMF3 network element in HPLMN in the embodiment of the present application. With reference to the embodiment shown in FIG. 6, details are not described herein again.
  • the AMF3 network element Since the AMF3 network element does not receive the identity of the V-PCF1 network element, the AMF3 network element reselects the H-PCF network element. Assuming that it is an H-PCF2 network element, the AMF3 network element sends a policy association to the H-PCF2 network element. A creation request message, so that the H-PCF2 network element receives a policy association creation request from an AMF3 network element, and the policy association creation request message is used to request the creation of a policy association.
  • the policy association creation request message in the embodiment of the present application may be, for example, a policy control creation request message, which is not specifically limited in this embodiment of the present application.
  • the H-PCF2 network element sends a policy association creation response message to the AMF3 network element, so that the AMF3 network element receives the policy association creation response message from the H-PCF2 network element.
  • the policy association creation response message in the embodiment of the present application may, for example, create a response message for policy control, which is not specifically limited in this embodiment of the present application.
  • the H-PCF2 network element sends a query request to the H-UDR network element, so that the H-UDR network element receives the query request from the H-PCF2 network element.
  • the query request is used to request a policy for the terminal stored in the H-UDR network element.
  • the H-UDR network element sends a query response to the H-PCF2 network element, so that the H-PCF2 network element receives the query response 2 from the H-UDR network element.
  • the query response includes the policy of the terminal stored in the H-UDR network element; otherwise, the policy of the terminal is not included in the query response.
  • the H-PCF2 network element determines a policy for updating the terminal, the H-PCF2 network element sends an N1N2 message transmission request to the AMF3 network element, so that the AMF3 network element receives the N1N2 message transmission request from the H-PCF2 network element .
  • the N1N2 message transmission request includes an updated terminal policy of the H-PCF2 network element, which is not specifically limited in this embodiment of the present application.
  • the policy association creation response message in the embodiment of the present application may, for example, create a response message for policy control, which is not specifically limited in this embodiment of the present application.
  • S713-S720 are the same as steps S617-S624 in FIG. 6.
  • steps S617-S624 are the same as steps S617-S624 in FIG. 6.
  • steps S617-S624 are the same as steps S617-S624 in FIG. 6.
  • the AMF3 network element sends a registration acceptance message to the terminal through the access device, so that the terminal receives the registration acceptance message from the AMF3 network element.
  • the AMF1 network element can learn that the terminal leaves VPLMN1, and thus can prompt the V-PCF1 network element to delete the V-UDR1 network element.
  • the strategy of the terminal can therefore save the storage resources in the V-UDR1 network element.
  • the actions of the AMF1 network element or the V-PCF1 network element in the above steps S701 to S721 can be executed by the processor 501 in the communication device 500 shown in FIG. 5 calling the application program code stored in the memory 503, which is implemented in this application.
  • the example does not place any restrictions on this.
  • the policy control system shown in FIG. 3 is applied to the 5G network architecture in the hometown routing roaming scenario shown in FIG. 1 or the local grooming roaming scenario shown in FIG. 2 as an example. It is assumed that the HPLMN of the terminal includes H -PCF1 network element and H-UDR network element, the terminal initiates the de-registration process at VPLMN1 where AMF1 network element, V-PCF1 network element, and V-UDR1 network element are located, as shown in Figure 8,
  • a policy control method provided in an embodiment of the present application includes the following steps:
  • the terminal sends a de-registration request (de-registration request) message to the AMF1 network element through the access device in VPLMN1, so that the AMF1 network element receives the de-registration request message from the terminal.
  • the deregistration request message is used to request deregistration of the execution terminal.
  • the AMF1 network element after the AMF1 network element receives the deregistration request message from the terminal, it can learn that the terminal leaves the VPLMN1 where the AMF1 network element is located, which is described here in a unified manner, and will not be described in detail below.
  • S802-S809 are the same as steps S617-S624 in FIG. 6. For related description, refer to the embodiment shown in FIG. 6, and details are not described herein again.
  • the AMF1 network element sends a de-registration acceptance message to the terminal through the access device, so that the terminal receives the de-registration acceptance message from the AMF1 network element.
  • the AMF1 network element can learn that the terminal leaves VPLMN1, and thus can instruct the V-PCF1 network element to delete the terminal stored in the V-UDR1 network element in time. This strategy can save storage resources in the V-UDR1 network element.
  • the actions of the AMF1 network element or the V-PCF1 network element in the above steps S801 to S811 can be executed by the processor 501 in the communication device 500 shown in FIG. 5 calling the application program code stored in the memory 503, which is implemented in this application.
  • the example does not place any restrictions on this.
  • the policy control system shown in FIG. 3 is applied to the 5G network architecture in the hometown routing roaming scenario shown in FIG. 1 or the local grooming roaming scenario shown in FIG. 2 as an example.
  • the HPLMN of the terminal includes a UDM
  • a policy control method according to an embodiment of the present application includes the following steps:
  • the UDM network element sends a de-registration notification to the AMF1 network element, so that the AMF1 network element receives the de-registration notification from the UDM network element.
  • the deregistration notification is used to notify the AMF1 network element to perform deregistration of the terminal.
  • the AMF1 network element after receiving the deregistration notification from the UDM network element, the AMF1 network element can learn that the terminal leaves the VPLMN1 where the AMF1 network element is located, which will be collectively described here, and will not be described in detail below.
  • the AMF1 network element sends a de-registration response (de-registration acknowledgement) to the UDM network element, so that the UDM network element receives the de-registration response from the AMF1 network element.
  • the terminal sends a de-registration request (de-registration request) message to the AMF1 network element through the access device in VPLMN1, so that the AMF1 network element receives the de-registration request message from the terminal.
  • the deregistration request message is used to request deregistration of the execution terminal.
  • step S903 it is not necessary to perform step S903, but the AMF1 network element performs implicit deregistration, which is not specifically limited in the embodiment of the present application.
  • S904-S911 are the same as steps S617-S624 in FIG. 6.
  • steps S617-S624 are the same as steps S617-S624 in FIG. 6.
  • steps S617-S624 are the same as steps S617-S624 in FIG. 6.
  • step S912 the AMF1 network element sends a de-registration acceptance message to the terminal through the access device, so that the terminal receives the de-registration acceptance message from the AMF1 network element.
  • the AMF1 network element can learn that the terminal leaves VPLMN1, and then can prompt the V-PCF1 network element to delete the V-UDR1 network element The strategy of the terminal can therefore save the storage resources in the V-UDR1 network element.
  • the actions of the AMF1 network element or the V-PCF1 network element in the above steps S901 to S913 can be executed by the processor 501 in the communication device 500 shown in FIG. 5 calling the application program code stored in the memory 503, which is implemented in this application.
  • the example does not place any restrictions on this.
  • the policy control system shown in FIG. 4 is applied to the 5G network architecture in the hometown routing roaming scenario shown in FIG. 1 or the local grooming roaming scenario shown in FIG. 2 as an example.
  • the HPLMN of the terminal includes a UDM Network element, H-PCF1 network element, H-PCF2 network element, and H-UDR network element
  • the terminal performs relocation of AMF network element in VPLMN1, and reselects from AMF4 network element in source area in VPLMN1 to VPLMN1
  • the AMF1 network element in the target area, the source area in VPLMN1 also includes the V-PCF4 network element and the V-UDR1 network element, and the target area in VPLMN1 also includes the V-PCF1 network element and the V-UDR1 network element, as shown in the figure.
  • a policy control method includes the following steps:
  • the terminal moves, and sends a registration request message to the AMF1 network element through the access device in VPLMN1, so that the AMF1 network element receives the registration request message from the terminal.
  • the AMF1 network element sends a context transmission request message to the AMF4 network element, so that the AMF4 network element receives the context transmission request message from the AMF1 network element, and the context transmission request message is used to request the context of the terminal.
  • the AMF4 network element after the AMF4 network element receives the context transmission request message from the AMF1 network element, it can learn that the terminal has reselected the AMF network element in the VPLMN1, which will be described collectively here, and will not be described in detail below.
  • the AMF4 network element sends a context transmission response message to the AMF1 network element, so that the AMF1 network element receives the context transmission response message from the AMF4 network element.
  • the context transmission response message includes the context of the terminal.
  • the context of the terminal sent by the AMF4 network element to the AMF1 network element includes the identity of the V-PCF4 network element in the source area.
  • the context transmission response message further includes an identifier of the V-UDR1 network element that stores the policy of the terminal in VPLMN1.
  • the V-UDR1 network element is a V-UDR network element selected by the V-PCF network element selected when the terminal first accesses the VPLMN1, and the V-PCF network element initially selected will identify the V-UDR1 network element. It is sent to the AMF network element selected by the terminal when it initially accesses the VPLMN1. When the initial AMF network element performs the AMF network element reselection in VPLMN1, the identity of the V-UDR1 network element is provided to the latest AMF network element.
  • the V-UDR1 is stored in the current AMF4 network element.
  • the identification of the network element is taken as an example.
  • the AMF4 network element may be the AMF network element selected when the terminal first accesses the VPLMN1, or may be the latest AMF network element before the reselection of the AMF network element occurs. This embodiment of the present application does not specifically limit this.
  • S1004-S1007 are similar to steps S604-S607 in FIG. 6, except that the AMF2 network element in VPLMN2 in steps S604-S607 is replaced with the AMF1 network element in VPLMN1 in the embodiment of the present application, and step S604- The AMF1 network element in VPLMN1 in S607 is replaced with the AMF4 network element in VPLMN1 in the embodiment of the present application.
  • the AMF1 network element receives the identity of the V-PCF4 network element, the AMF1 network element still reselects the V-PCF network element and the H-PCF network element, assuming that it is the V-PCF1 network element and the H-PCF2 network element, respectively.
  • the AMF1 network element sends a policy association creation request message 1 to the V-PCF1 network element, so that the V-PCF1 network element receives the policy association creation request message 1 from the AMF1 network element, and the policy association creation request message 1 is used to request the creation of a policy.
  • the policy association creation request message 1 further includes the identity of the V-UDR1 network element obtained in step S1003.
  • the policy association creation request message 1 in the embodiment of the present application may be, for example, a policy control creation request message 1, which is not specifically limited in this embodiment of the present application.
  • the V-PCF1 network element sends a policy association creation response message 1 to the AMF1 network element, so that the AMF1 network element receives the policy association creation response message 1 from the V-PCF1 network element.
  • the policy association creation response message 1 in the embodiment of the present application may, for example, create a response message 1 for policy control, which is not specifically limited in this embodiment of the present application.
  • the V-PCF1 network element sends a query request 1 to the V-UDR1 network element corresponding to the identity of the V-UDR1 network element, so that the V-UDR1 network element receives the query request 1 from the V-PCF1 network element.
  • the query request 1 is used to request a policy of a terminal stored in a V-UDR1 network element.
  • the V-UDR1 network element sends a query response 1 to the V-PCF1 network element, so that the V-PCF1 network element receives the query response 1 from the V-UDR1 network element.
  • the query response 1 includes the policy of the terminal stored in the V-UDR1 network element; otherwise, the query response 1 does not include the terminal's policy.
  • S1012-S1015 are similar to steps S612-S615 in FIG. 6, except that the V-PCF2 network element in steps S612-S615 is replaced with the V-PCF1 network element in the embodiment of the present application.
  • the V-PCF2 network element in steps S612-S615 is replaced with the V-PCF1 network element in the embodiment of the present application.
  • the embodiment shown in FIG. 6 is not repeated here.
  • the V-PCF1 network element sends an N1N2 message transmission request to the AMF1 network element, so that the AMF1 network element receives the N1N2 message transmission request from the V-PCF1 network element.
  • the N1N2 message transmission request includes the updated V-PCF1 network element. Endpoint strategy.
  • the N1N2 message transmission request includes the updated H-PCF2 network element.
  • the policy of the terminal is not specifically limited in this embodiment of the present application.
  • the policy association creation response message 1 in the embodiment of the present application may, for example, create a response message 1 for policy control, which is not specifically limited in this embodiment of the present application.
  • the AMF4 network element sends a policy association deletion request 1 to the V-PCF4 network element, so that the V-PCF4 network element receives the policy association deletion request 1 from the AMF4 network element.
  • the policy association deletion request 1 is used to request the V-PCF4 network element to delete the policy association created by the AMF4 network element and the V-PCF4 network element.
  • the policy association deletion request 1 in the embodiment of the present application may be, for example, a policy control deletion request message 1, which is not specifically limited in this embodiment of the present application.
  • the V-PCF4 network element sends a policy association deletion response 1 to the AMF4 network element, so that the AMF4 network element receives the policy association deletion response 1 from the V-PCF4 network element.
  • the policy association deletion response 1 is used to indicate that the policy association created by the AMF4 network element and the V-PCF4 network element before the V-PCF4 network element has been deleted.
  • the policy association deletion response 1 in the embodiment of the present application may be, for example, a policy control deletion response message 1, which is not specifically limited in this embodiment of the present application.
  • S1019-S1022 is similar to steps S621-S624 in FIG. 6, except that the V-PCF1 network element in steps S621-S624 is replaced with the V-PCF4 network element in the embodiment of the present application.
  • the V-PCF1 network element in steps S621-S624 is replaced with the V-PCF4 network element in the embodiment of the present application.
  • the embodiment shown in FIG. 6 is not repeated here.
  • the AMF1 network element sends a registration acceptance message to the terminal through the access device, so that the terminal receives the registration acceptance message from the AMF1 network element.
  • the AMF1 network element in VPLMN1 can obtain the identity of the V-UDR1 network element in VPLMN1 from the AMF4 network element in VPLMN1, and
  • the identity of the V-UDR1 network element is sent to the newly selected V-PCF1 network element, so that the V-PCF1 network element can obtain the terminal's identity from the V-UDR1 network element corresponding to the identity of the V-UDR1 network element.
  • the terminal moves between different AMF network elements in VPLMN1, it is guaranteed that different V-PCFs can find the same V-UDR1 network element, and the terminal can be obtained from the V-UDR1.
  • the actions of the AMF1 network element or the V-PCF1 network element in the above steps S1001 to S1023 can be executed by the processor 501 in the communication device 500 shown in FIG. 5 calling the application program code stored in the memory 503, which is implemented in this application.
  • the example does not place any restrictions on this.
  • the HPLMN of the terminal includes the UDM network element, H-PCF1 network element, and H-UDR network element in FIG. 10, and the AMF network element selected when the terminal first accesses VPLMN1 shown in FIG. 10 is
  • the AMF4 network element is taken as an example to provide a policy control method provided in the embodiment of the present application. As shown in FIG. 11, the method includes the following steps:
  • the terminal sends a registration request message to the AMF4 network element through the access device in VPLMN1, so that the AMF4 network element receives the registration request message from the terminal.
  • the AMF4 network element registers with the UDM network element, and obtains the contract data of the terminal.
  • the AMF4 network element after the AMF4 network element is registered with the UDM network element, it may also subscribe to the contract data modification notification.
  • the AMF4 network element may also subscribe to the contract data modification notification.
  • AMF4 network element selects V-PCF network element and H-PCF network element, assuming V-PCF4 network element and H-PCF1 network element respectively, then AMF4 network element sends policy association creation request 1 to V-PCF4 network element, In this way, the V-PCF4 network element receives a policy association creation request message 1 from the AMF4 network element, and the policy association creation request message 1 is used to request the creation of a policy association.
  • the policy association creation request message 1 in the embodiment of the present application may be, for example, a policy control creation request message 1, which is not specifically limited in this embodiment of the present application.
  • the policy association creation request message 1 may further include indication information 1, which is used to instruct the terminal to register to VPLMN1 where the V-PCF4 network element is located, which is not described in this embodiment of the present application. Specific limitations.
  • S1104-S1111 is similar to steps S609-S616 in FIG. 6, except that the V-PCF2 network element in steps S609-S616 is replaced with the V-PCF4 network element in the embodiment of the present application, and the steps S609-S616 are replaced.
  • AMF2 network element is replaced by the AMF4 network element in the embodiment of the present application
  • the V-UDR2 network element in steps S609-S616 is replaced by the V-UDR1 network element in the embodiment of the present application.
  • the H in step S609-S616 is replaced by -The PCF2 network element is replaced with the H-PCF1 network element in the embodiment of the present application.
  • the policy association creation response message 1 in step S1104 in the embodiment of the present application may further include the identification of the V-UDR1 network element, so that the AMF4 network element stores the identification of the V-UDR1 network element. Not specifically limited.
  • the V-PCF4 network element may also send the identification of the V-UDR1 network element to the AMF4 network element through a newly defined message, which is not specifically limited in this embodiment of the present application.
  • step S1103 includes the indication information 1
  • the AMF4 network element sends a registration acceptance message to the terminal through the access device, so that the terminal receives the registration acceptance message from the AMF4 network element.
  • the AMF4 network element initiates a paging, and the terminal initiates a service request process to enter the connected state.
  • the AMF4 network element When the terminal is in a connected state, the AMF4 network element provides the terminal with the received terminal policy.
  • S1115 The terminal updates the policy of the terminal, and returns the result of the policy update of the terminal to the AMF4 network element.
  • the AMF4 network element sends a N1 message notification to the V-PCF4 network element, so that the V-PCF4 network element receives the N1 message notification from the AMF4 network element.
  • the N1 message is used to indicate the result of the policy update of the terminal.
  • the AMF4 network element that the terminal initially accesses can obtain the V-UDR1 network selected by the V-PCF4 network element that the terminal initially selects when accessing the VPLMN1.
  • Element identification so that when subsequent terminals reselect AMF network elements in VPLMN1, the V-UDR1 network element identification can be provided to the latest AMF network element, and the latest AMF network element to the latest V-PCF The network element, and thus the latest V-PCF network element, can obtain the terminal's policy from the V-UDR1 network element corresponding to the identity of the V-UDR1 network element.
  • the terminal can be used for different AMF network elements in VPLMN1.
  • V-PCFs When moving from time to time, it is guaranteed that different V-PCFs can find the same V-UDR1 network element, and then the terminal's policy can be obtained from the V-UDR1.
  • the actions of the AMF4 network element or the V-PCF4 network element in the above steps S1101 to S1116 can be executed by the processor 501 in the communication device 500 shown in FIG. 5 calling the application program code stored in the memory 503, which is implemented in this application.
  • the example does not place any restrictions on this.
  • the policy control method shown in FIG. 11 may be executed first to enable the terminal to access the VPLMN1 network, and then in the case where the AMF network element reselection occurs in VPLMN1, the execution shown in FIG. 10 is performed. Policy control method; further, when the terminal leaves VPLMN1 where the AMF1 network element is located, the policy control method shown in FIG. 6, FIG. 7, FIG. 8 or FIG. 9 is executed, which is not specifically limited in this embodiment of the present application.
  • the first mobility management network element or the policy control network element includes a hardware structure and / or a software module corresponding to each function.
  • this application can be implemented in the form of hardware or a combination of hardware and computer software. Whether a certain function is performed by hardware or computer software-driven hardware depends on the specific application of the technical solution and design constraints. Professional technicians can use different methods to implement the described functions for each specific application, but such implementation should not be considered to be beyond the scope of this application.
  • the first mobile management network element or the policy control network element may be divided into functional modules according to the foregoing method example.
  • each functional module may be divided corresponding to each function, or two or more functions may be integrated.
  • a processing module In a processing module.
  • the above integrated modules may be implemented in the form of hardware or software functional modules. It should be noted that the division of the modules in the embodiments of the present application is schematic, and is only a logical function division. In actual implementation, there may be another division manner.
  • FIG. 12 shows a schematic structural diagram of a first mobility management network element 120.
  • the first mobility management network element 120 is a mobility management network element of the first visited network, and includes: a processing module 1201 and a transceiver module 1202.
  • the processing module 1201 is configured to determine that the terminal leaves the first visited network;
  • the transceiver module 1202 is configured to send instruction information to the policy control network element of the first visited network, and the instruction information is used to instruct the policy control network element to delete the first visit The policy of the terminal stored in the unified database network element of the local network.
  • the processing module 1201 is specifically configured to: receive a first context transmission request message from a second mobility management network element of the second visited network, and the first context transmission request message is used to request the context of the terminal.
  • the processing module 1201 is specifically configured to receive a second context transmission request message from a third mobility management network element of the terminal's home network, and the second context transmission request message is used to request to obtain the context of the terminal.
  • the processing module 1201 is specifically configured to receive a deregistration request from the terminal, and the deregistration request is used to request the deregistration of the terminal to be performed.
  • the processing module 1201 is specifically configured to receive a deregistration notification from the data management network element, and the deregistration notification is used to notify the first mobile management network element to perform deregistration of the terminal.
  • the transceiver module 1202 is further configured to receive a registration request from a terminal.
  • the transceiver module 1202 is further configured to send a third context transmission request message to a fourth mobility management network element in the first visited network, where the third context transmission request message is used to request the context of the terminal.
  • the transceiver module 1202 is further configured to receive a context transmission response from the fourth mobility management network element, where the context transmission response includes an identifier of a unified database network element.
  • the transceiver module 1202 is further configured to send the identity of the unified database network element to the policy control network element, and the identity of the unified database network element is used to obtain the policy of the terminal from the unified database network element.
  • the transceiver module 1202 is further configured to receive a registration request from a terminal.
  • the transceiver module 1202 is further configured to send a policy association creation request message to the policy control network element.
  • the transceiver module 1202 is further configured to receive the identity of the unified database network element from the policy control network element.
  • the transceiver module 1202 is further configured to receive a fourth context transmission request message from a fifth mobility management network element in the first visited network, and the fourth context transmission request message is used to request the context of the terminal.
  • the transceiver module 1202 is further configured to send a context transmission response to the fifth mobility management network element, where the context transmission response includes an identifier of the unified database network element, and the identifier of the unified database network element is used to obtain a policy of the terminal from the unified database network element.
  • the first mobility management network element 120 is presented in the form of dividing each functional module in an integrated manner.
  • the "module” herein may refer to a specific ASIC, a circuit, a processor and a memory executing one or more software or firmware programs, an integrated logic circuit, and / or other devices that can provide the above functions.
  • the first mobility management network element 120 may adopt the form shown in FIG. 5.
  • the processor 501 in FIG. 5 may cause a first mobile management network element 120 to execute the policy control method in the foregoing method embodiment by calling a computer execution instruction stored in the memory 503.
  • the function / implementation process of the transceiver module 1202 and the processing module 1201 in FIG. 12 may be implemented by the processor 501 in FIG. 5 calling a computer execution instruction stored in the memory 503.
  • the function / implementation process of the processing module 1201 in FIG. 12 may be implemented by the processor 501 in FIG. 5 calling a computer execution instruction stored in the memory 503, and the function / implementation process of the transceiver module 1202 in FIG. 12 may be performed through the graph. 5 to implement the communication interface 504.
  • the first mobility management network element 120 provided in this embodiment can execute the foregoing policy control method, the technical effects that can be obtained can refer to the foregoing method embodiments, and details are not described herein again.
  • an embodiment of the present application further provides a device (for example, the device may be a chip system).
  • the device includes a processor, and is configured to support a first mobility management network element to implement the foregoing policy control method, such as determining that a terminal leaves.
  • the first visited network In one possible design, the device further includes a memory.
  • the memory is used to store program instructions and data necessary for the first mobility management network element. Of course, the memory may not be in the device.
  • the device is a chip system, the device may be composed of a chip, and may also include a chip and other discrete devices, which are not specifically limited in the embodiments of the present application.
  • FIG. 13 shows a schematic structural diagram of a policy control network element 130.
  • the policy control network element 130 is a policy control network element of the first visited network, and includes a receiving module 1301 and a sending module 1302.
  • a receiving module 1301 is configured to receive instruction information from a first mobile management network element of a first visited network, where the instruction information is used to instruct a policy control network element 130 to delete a terminal stored in a unified database network element of the first visited network.
  • the sending module 1302 is configured to send a delete request message to the unified database network element according to the instruction information, and the delete request message is used to request to delete the policy of the terminal stored in the unified database network element.
  • the policy control network element 130 further includes a processing module 1303.
  • the receiving module 1301 is further configured to receive an identifier of a unified database network element from the first mobility management network element.
  • the processing module 1303 is configured to obtain a policy of the terminal from the unified database network element corresponding to the identifier of the unified database network element.
  • the receiving module 1301 is further configured to receive a policy association creation request message from the first mobility management network element.
  • the processing module 1303 is further configured to select a unified database network element storage strategy for the terminal.
  • the sending module 1302 is further configured to send the identifier of the unified database network element to the first mobility management network element.
  • the policy control network element 130 is presented in the form of dividing each functional module in an integrated manner.
  • the "module” herein may refer to a specific ASIC, a circuit, a processor and a memory executing one or more software or firmware programs, an integrated logic circuit, and / or other devices that can provide the above functions.
  • the policy control network element 130 may take the form shown in FIG. 5.
  • the processor 501 in FIG. 5 may cause the policy control network element 130 to execute the policy control method in the foregoing method embodiment by calling a computer execution instruction stored in the memory 503.
  • the function / implementation process of the receiving module 1301, the sending module 1302, and the processing module 1303 in FIG. 13 may be implemented by the processor 501 in FIG. 5 calling a computer execution instruction stored in the memory 503.
  • the function / implementation process of the processing module 1303 in FIG. 13 may be implemented by the processor 501 in FIG. 5 calling a computer execution instruction stored in the memory 503, and the function / implementation of the receiving module 1301 and the sending module 1302 in FIG. 13
  • the process may be implemented through the communication interface 504 in FIG. 5.
  • the policy control network element 130 provided in this embodiment can execute the foregoing policy control method, the technical effects that can be obtained can refer to the foregoing method embodiments, and details are not described herein again.
  • an embodiment of the present application further provides a device (for example, the device may be a chip system).
  • the device includes a processor, and is configured to support a policy control network element to implement the foregoing policy control method, for example, selecting a unified database network element. Save the policy of the terminal.
  • the device further includes a memory. This memory is used to store program instructions and data necessary for the policy control network element. Of course, the memory may not be in the device.
  • the device is a chip system, the device may be composed of a chip, and may also include a chip and other discrete devices, which are not specifically limited in the embodiments of the present application.
  • FIG. 14 shows a schematic structural diagram of a first mobility management network element 140.
  • the first mobility management network element 140 is a mobility management network element of the first visited network, and includes a receiving module 1401 and a sending module 1402.
  • the receiving module 1401 is configured to receive a registration request from a terminal.
  • the sending module 1402 is configured to send a first context transmission request to a second mobility management network element in the first visited network, and the first context transmission request message is used to request to obtain the context of the terminal.
  • the receiving module 1401 is further configured to receive a context transmission response from the second mobility management network element, where the context transmission response includes an identifier of a unified database network element of the first visited network.
  • the sending module 1402 is further configured to send the identity of the unified database network element to the policy control network element of the first visited network, and the identity of the unified database network element is used to obtain the policy of the terminal from the unified database network element.
  • the first mobility management network element 140 further includes: a processing module 1403.
  • the processing module 1403 is configured to determine that the terminal leaves the first visited network.
  • the sending module 1402 is configured to send instruction information to the policy control network element, where the instruction information is used to instruct the policy control network element to delete the policy of the terminal stored in the unified database network element.
  • the processing module 1403 is specifically configured to: receive a second context transmission request message from a third mobility management network element of the second visited network, and the second context transmission request message is used to request the context of the terminal.
  • the processing module 1403 is specifically configured to: receive a third context transmission request message from a fourth mobility management network element of the terminal's home network, and the third context transmission request message is used to request the context of the terminal.
  • the processing module 1403 is specifically configured to: receive a deregistration request from the terminal, and the deregistration request is used to request the deregistration of the terminal to be performed.
  • the processing module 1403 is specifically configured to receive a deregistration notification from the data management network element, and the deregistration notification is used to notify the first mobile management network element to perform deregistration of the terminal.
  • the first mobility management network element 140 is presented in the form of dividing each functional module in an integrated manner.
  • the "module” herein may refer to a specific ASIC, a circuit, a processor and a memory executing one or more software or firmware programs, an integrated logic circuit, and / or other devices that can provide the above functions.
  • the first mobility management network element 140 may adopt the form shown in FIG. 5.
  • the processor 501 in FIG. 5 may cause the first mobility management network element 140 to execute the policy control method in the foregoing method embodiment by calling a computer execution instruction stored in the memory 503.
  • the function / implementation process of the receiving module 1401, the sending module 1402, and the processing module 1403 in FIG. 14 may be implemented by the processor 501 in FIG. 5 calling a computer execution instruction stored in the memory 503.
  • the function / implementation process of the processing module 1403 in FIG. 14 may be implemented by the processor 501 in FIG. 5 calling a computer execution instruction stored in the memory 503, and the function / implementation of the receiving module 1401 and the sending module 1402 in FIG. 14
  • the process may be implemented through the communication interface 504 in FIG. 5.
  • the first mobility management network element 140 provided in this embodiment can execute the foregoing policy control method, the technical effects that can be obtained can refer to the foregoing method embodiments, and details are not described herein again.
  • an embodiment of the present application further provides a device (for example, the device may be a chip system).
  • the device includes a processor, and is configured to support a first mobility management network element to implement the foregoing policy control method, such as determining that a terminal leaves The first visited network.
  • the device further includes a memory.
  • the memory is used to store program instructions and data necessary for the first mobility management network element.
  • the memory may not be in the device.
  • the device may be composed of a chip, and may also include a chip and other discrete devices, which are not specifically limited in the embodiments of the present application.
  • FIG. 15 shows a schematic structural diagram of a policy control network element 150.
  • the policy control network element 150 is a policy control network element of the first visited network, and includes a transceiver module 1502 and a processing module 1501.
  • the transceiver module 1502 is configured to receive a policy association creation request message from a first mobile management network element of the first visited network, where the policy association creation request message includes an identifier of a unified database network element of the first visited network.
  • the processing module 1501 is configured to obtain a policy of the terminal from the unified database network element corresponding to the identifier of the unified database network element.
  • the transceiver module 1502 is further configured to receive instruction information from the first mobility management network element, where the instruction information is used to instruct the policy control network element to delete the policy of the terminal stored in the unified database network element.
  • the transceiver module 1502 is further configured to send a delete request message to the unified database network element according to the instruction information, and the delete request message is used to request a policy for deleting the terminal stored in the unified database network element.
  • the policy control network element 150 is presented in the form of dividing each functional module in an integrated manner.
  • the "module” herein may refer to a specific ASIC, a circuit, a processor and a memory executing one or more software or firmware programs, an integrated logic circuit, and / or other devices that can provide the above functions.
  • the policy control network element 150 may adopt the form shown in FIG. 5.
  • the processor 501 in FIG. 5 may invoke a computer execution instruction stored in the memory 503 to cause the policy control network element 150 to execute the policy control method in the foregoing method embodiment.
  • the function / implementation process of the transceiver module 1502 and the processing module 1501 in FIG. 15 may be implemented by the processor 501 in FIG. 5 calling a computer execution instruction stored in the memory 503.
  • the function / implementation process of the processing module 1501 in FIG. 15 may be implemented by the processor 501 in FIG. 5 calling a computer execution instruction stored in the memory 503, and the function / implementation process of the transceiver module 1502 in FIG. 15 may be performed through the graph. 5 to implement the communication interface 504.
  • the policy control network element 150 provided in this embodiment can execute the foregoing policy control method, the technical effects that can be obtained can refer to the foregoing method embodiments, and details are not described herein again.
  • an embodiment of the present application further provides a device (for example, the device may be a chip system).
  • the device includes a processor, and is configured to support a policy control network element to implement the policy control method, for example, from a unified database network element The strategy of obtaining the terminal by the unified database network element corresponding to the identification of the.
  • the device further includes a memory. This memory is used to store program instructions and data necessary for the policy control network element. Of course, the memory may not be in the device.
  • the device is a chip system, the device may be composed of a chip, and may also include a chip and other discrete devices, which are not specifically limited in the embodiments of the present application.
  • the computer program product includes one or more computer instructions.
  • the computer may be a general-purpose computer, a special-purpose computer, a computer network, or other programmable devices.
  • the computer instructions may be stored in a computer-readable storage medium, or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be from a website site, a computer, a server, or a data center.
  • the computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device including one or more servers, data centers, and the like that can be integrated with the medium.
  • the usable medium may be a magnetic medium (for example, a floppy disk, a hard disk, a magnetic tape), an optical medium (for example, a DVD), or a semiconductor medium (for example, a solid state disk (SSD)).

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Des modes de réalisation de la présente invention concernent un procédé, un dispositif et un système de commande de politique, de telle sorte que la ressource de stockage d'un élément de réseau V-UDR peut être économisée. Le procédé de commande de politique comprend les étapes suivantes : un premier élément de réseau de gestion de mobilité d'un premier réseau visité détermine qu'un terminal quitte le premier réseau visité ; le premier élément de réseau de gestion de mobilité transmet des informations d'indication à l'élément de réseau de commande de politique du premier réseau visité, les informations d'indication étant utilisées pour indiquer l'élément de réseau de commande de politique afin de supprimer la politique du terminal sauvegardée dans le référentiel de données unifié du premier réseau visité.
PCT/CN2019/097541 2018-08-13 2019-07-24 Procédé, dispositif et système de commande de politique WO2020034817A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810916262.0A CN110831088B (zh) 2018-08-13 2018-08-13 策略控制方法、设备及系统
CN201810916262.0 2018-08-13

Publications (1)

Publication Number Publication Date
WO2020034817A1 true WO2020034817A1 (fr) 2020-02-20

Family

ID=69525117

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/097541 WO2020034817A1 (fr) 2018-08-13 2019-07-24 Procédé, dispositif et système de commande de politique

Country Status (2)

Country Link
CN (1) CN110831088B (fr)
WO (1) WO2020034817A1 (fr)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114449657A (zh) * 2020-11-06 2022-05-06 维沃移动通信有限公司 策略关联的建立方法及装置、终端及网络侧设备
CN115915289A (zh) * 2021-08-10 2023-04-04 维沃移动通信有限公司 计算任务的策略确定或资源分配方法、装置、网元及介质
CN116567768A (zh) * 2022-01-30 2023-08-08 华为技术有限公司 一种确定用户设备路由选择策略的方法和装置
CN116744433A (zh) * 2022-03-04 2023-09-12 维沃移动通信有限公司 信息处理方法、装置、通信设备及可读存储介质
CN115426698A (zh) * 2022-08-30 2022-12-02 中国联合网络通信集团有限公司 路由选择策略的配置方法、装置以及计算机可读存储介质

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120239771A1 (en) * 2009-11-30 2012-09-20 Nokia Siemens Networks Oy Method and network device establishing a binding between a plurality of separate sessions in a network
CN102984684A (zh) * 2011-09-06 2013-03-20 华为技术有限公司 一种上报终端信息的方法和终端
WO2018038497A1 (fr) * 2016-08-23 2018-03-01 엘지전자 주식회사 Procédé et équipement d'utilisateur de repli destinés à un appel vocal depuis une communication mobile 5g vers 4g

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101730150B (zh) * 2009-01-19 2013-08-07 中兴通讯股份有限公司 业务流迁移时对网络资源进行控制的方法
US20190021064A1 (en) * 2016-07-04 2019-01-17 Lg Electronics Inc. Method for managing registration in wireless communication system and device for same
KR102201279B1 (ko) * 2016-11-27 2021-01-11 엘지전자 주식회사 무선 통신 시스템에서의 등록 해제 방법 및 이를 위한 장치
US10849186B2 (en) * 2017-01-09 2020-11-24 Huawei Technologies Co., Ltd. System and methods for session management

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120239771A1 (en) * 2009-11-30 2012-09-20 Nokia Siemens Networks Oy Method and network device establishing a binding between a plurality of separate sessions in a network
CN102984684A (zh) * 2011-09-06 2013-03-20 华为技术有限公司 一种上报终端信息的方法和终端
WO2018038497A1 (fr) * 2016-08-23 2018-03-01 엘지전자 주식회사 Procédé et équipement d'utilisateur de repli destinés à un appel vocal depuis une communication mobile 5g vers 4g

Also Published As

Publication number Publication date
CN110831088B (zh) 2021-05-04
CN110831088A (zh) 2020-02-21

Similar Documents

Publication Publication Date Title
WO2020034817A1 (fr) Procédé, dispositif et système de commande de politique
WO2019085753A1 (fr) Procédé, dispositif et système d'établissement de session
EP3790315B1 (fr) Procédés de transfert intercellulaire, appareils, système de communication et support de stockage lisible par ordinateur
JP6768976B2 (ja) サブスクリプション更新方法、装置、及びシステム
JP7139522B2 (ja) ローカルエリアネットワーク通信方法、装置、およびシステム
JP7184922B2 (ja) Ueのためにポリシーを構成するための方法、装置、及びシステム
CN111565385B (zh) 一种策略提供方法、装置和系统
JP2020537466A (ja) セッション確立方法およびシステム、ならびにデバイス
WO2020063397A1 (fr) Procédé, appareil, et système de mise à jour d'abonnement
WO2020164290A1 (fr) Procédé, appareil et système de commande de politique
CN111328110A (zh) 网络切片选择的方法、设备及系统
CN110324152B (zh) 策略和计费控制规则获取方法、装置及系统
US20230388389A1 (en) Communication method and communication apparatus
WO2019218847A1 (fr) Procédé, dispositif et système de commande de politique
WO2019218762A1 (fr) Procédé, dispositif et système de commande de règles
KR102268412B1 (ko) 핸드오버 방법, 디바이스 및 시스템
WO2022062889A1 (fr) Procédé et appareil de gestion de tranche, et dispositif de communication
WO2019091174A1 (fr) Procédé et dispositif d'envoi de message court
WO2021115464A1 (fr) Procédé de sélection de tranche de réseau et dispositif associé
WO2020164562A1 (fr) Procédé, appareil et système de fourniture de politique
WO2023010995A1 (fr) Procédé et dispositif de sélection d'une zone de suivi, et système
WO2023010979A1 (fr) Procédé et appareil de communication
JP7486619B2 (ja) ショートメッセージサービス(sms)サービスのための更新サービス動作
WO2019015627A1 (fr) Procédé, appareil et système de transfert

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19849877

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19849877

Country of ref document: EP

Kind code of ref document: A1